Tuesday, April 28, 2009

Cisco devices permits to password recovery by default during the reload system. But if person has a physical access to devices he can change password.For this reason, you may want to disable password recovery procedure.

Use the “no service password-recovery” commandWhen you do this carefully read the warning message.

Router(config)#no service password-recoveryWARNING:Executing this command will disable password recovery mechanism.Do not execute this command without another plan forpassword recovery.Are you sure you want to continue? [yes/no]: yesRouter(config)#
Read more...

To block dictionary attack on Cisco routing and switching devices we can use login block- for command.By using this command we can block for ‘x’ seconds after failed ‘y’ logins are tried within ‘z’ seconds.The following example shows how block login access for 100 seconds after 4 failed login attempts within 20 seconds:

login block-for 100 attempts 4 within 20During this block period all types of login attempts( Telnet, SSH, and HTTP) are denied.

But it is possible to exclude IP address for this blocking.Ex: Exclude 192.168.1.0 Network (C Class)

A warning message will appear, stating that for the SSL bridging settings to take effect, you must recycle the default application pool of IIS. If you want to recycle the default application pool now click Yes. To recycle the default application pool manually later, click No.

Thursday, April 16, 2009

Use the quey below to find detailed information about processes.How many process are working? , How many are sleeping..., and the total number of processes.SELECT COUNT(*) AS ProcessStatusCount,CASE StatusWHEN 'Running' THEN 'Number of Process Currently Running One or More Requests 'WHEN 'Sleeping ' THEN 'Number of Process Currently Sleeping'ELSE 'Dormant – Session resetsEND StatusFROM sys.dm_exec_sessions GROUP BY Status

For ComputersFind "Group Policy refresh interval for computers," then select Enabled. Enter the new refresh rate and the maximum random time to wait for the refresh (to prevent all machines getting GPO updates at the same time), click OK.For DCsIf required, open Group Policy refresh interval for domain controllers," then select Enabled. Enter the new refresh rate, this refresh rate must be significantly less than average computer policy refresh rate, and the maximum random time to wait for the refresh (to avoid all machines updating at the same time), click OK.For UsersExpand User Configuration, Administrative Templates, System, Group Policy.

You can provide High Availibility to your Exchange 2007 server by using Local Continious future without using another hardwares.

To enable this future open Exchange Management Console. Choose Mailbox Under Server Configuration.

In the right pane in database managment TAB, Right click "First Storage Group" and Choose "Enable Local Continuous Replication".

click NEXT .

Enter path for system and log files .

Cick Next and Enter the path for LCR database.

(Using another physical disk will increase performance of your replication.)

You must use identical name for your LCR database file name.

Click Next. And click Enable on the next screen. After successful completion . Click finish.

Control creation of new files by comparing two locations.

LatestAvailableLogTime
The time stamp on the source storage group of the most recently detected new transaction log file.LastCopyNotificationedLogTime
The time associated with the last new log generated by the active storage group and known to the copy.LastCopiedLogTimeThe time stamp on the source storage group of the last successful copy of a transaction log file.LastInspectedLogTimeThe time stamp on the target storage group of the last successful inspection of a transaction log file.SeedingIndicates that seeding is in progress. Possible values are True and False.

Firstly each GFI MailEssentials anti-spam module may be configured to record all blocked emails to a log file. This can be enabled as follows:

Open the GFI MailEssentials configuration.Expand ‘Anti-Spam’ and click on the module you want to enable logging for.Click on ‘Properties’ and select the ‘Other’ tab.Enable ‘Log occurrence to this file’.Configure the path to the log file or leave as default.

Lastly you can gind GFI Mail Essentials system logs on "C:\Program Files\GFI\MailEssentials\DebugLogs" directory.

About Me

I have been in IT sector for 10 years. As professionals know everything is not going in rules. I will share my experiences and small tips&tricks about Microsoft Server Family , Cisco Devices , HP and IBM servers and storages on this site.
Egemen TANIRER (Computer Engineer)